Financial Cryptography 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003. Revised Papers / [electronic resource] : edited by Rebecca N. Wright. - Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2003. - VIII, 328 p. online resource. - Lecture Notes in Computer Science, 2742 0302-9743 ; . - Lecture Notes in Computer Science, 2742 .

Micropayment and E-cash -- Using Trust Management to Support Transferable Hash-Based Micropayments -- A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks -- On the Anonymity of Fair Offline E-cash Systems -- Retrofitting Fairness on the Original RSA-Based E-cash -- Panel: Does Anyone Really Need MicroPayments? -- Does Anyone Really Need MicroPayments? -- The Case Against Micropayments -- Security, Anonymity, and Privacy -- On the Economics of Anonymity -- Squealing Euros: Privacy Protection in RFID-Enabled Banknotes -- How Much Security Is Enough to Stop a Thief? -- Attacks -- Cryptanalysis of the OTM Signature Scheme from FC’02 -- “Man in the Middle” Attacks on Bluetooth -- Fault Based Cryptanalysis of the Advanced Encryption Standard (AES) -- Panel: Economics of Security -- Economics, Psychology, and Sociology of Security -- Fair Exchange -- Timed Fair Exchange of Standard Signatures -- Asynchronous Optimistic Fair Exchange Based on Revocable Items -- Auctions -- Fully Private Auctions in a Constant Number of Rounds -- Secure Generalized Vickrey Auction Using Homomorphic Encryption -- Panel: Trusted Computing Platforms -- Trusted Computing Platforms: The Good, the Bad, and the Ugly -- On TCPA -- Cryptographic Tools and Primitives -- On The Computation-Storage Trade-Offs of Hash Chain Traversal -- Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures -- Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making.

9783540451266

10.1007/978-3-540-45126-6 doi


Computer science.
Computer Communication Networks.
Operating systems (Computers).
Data encryption (Computer science).
Computer software.
Information Systems.
Computer Science.
Data Encryption.
Computer Communication Networks.
Operating Systems.
Algorithm Analysis and Problem Complexity.
Computers and Society.
Management of Computing and Information Systems.

QA76.9.A25

005.82
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha